www.ijcrt.org © 2018 IJCRT | Volume 6, Issue 2 April 2018 | ISSN: 2320-2882 IJCRT1892208 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 1368 Analysis of Network Layer Attacks on Secure Routing Protocol in MANET Rashmi Jatain B.Tech, M.Tech , CSE AbstractAn ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secured routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of attacks and efficiency are primary points of concern in implementing these protocols. Some of the available secure routing protocols and most common network layer attacks against mobile ad hoc networks are evaluated. Secure routing protocols are analysed against the most commonly identified network layer attacks such as: denial-ofservice attack, tunneling, spoofing, blackhole attack and wormhole attack and their comparative analysis is also done KeywordsMANET, Secure Routing Protocols, Network Layer Attacks and Analysis. Introduction- The latest advancement in wireless technology and its applications received a lot of attention. An ad hoc network is one such recent technology, which gives a new paradigm for wireless self-organised networks. Ad hoc networks are simple peer-to peer networks, self-organised and with no fixed infrastructure. Ad-hoc network is a concept in computer communication which means that user wants to communicate with each other to form a temporary network, without use of centralized administration. Each node in the network acts both as host and router and must therefore willing to forward packet for other node.[1] A Mobile Adhoc Network (MANET) is a temporary wireless network composed of mobile nodes without any permanent infrastructure. Each node not only operates as an end system, it also acts as a router to forward packets on behalf of other nodes [1]. One of the best features of MANET is its flexibility and can configure itself in the fly and thus very suitable for the emergency situation. Most common issues related to nodes in MANETs are limited resources such as battery backup, limited range etc., dynamic topology i.e number of nodes keeps on changing on the fly and address assignment as allocating address to different nodes successfully. Wireless channels are also facing some issues such as Relatively High Error Rate, High variability in the quality, Low bandwidth, Broadcast Nature and Security Aspects [2]. MANETs are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures and open medium of communication, which, unlike their wired counterparts, cannot be secured [3][4]. To address these concerns, several secure routing protocols have been developed: Secure Efficient Distance Vector Routing (SEAD), Ariadne, Authenticated Routing for Ad hoc Networks (ARAN), Secure Ad hoc On-Demand Distance Vector Routing (SAODV), Secure Routing Protocol (SRP), Security- Aware Routing Protocol (SAR) [5][6][7]. The goal of this paper is analyse secure routing protocols in MANET against network layer attack patterns in ad hoc environment based on the literature study[8][9][10] . From literature is concluded that none of secure routing protocol is secure enough against various attacks. The secure-protocol development has become the most challenging task in securing ad hoc networks. Most of these existing protocols have been developed based on specific security scenarios. So the main purpose of this research is to understand more deeply and analyse MANETs secure routing protocols with network layer attacks [11][12][13. This section contains basic about MANETs, related issues, section 2 contains details about various network layer attacks, section 3 has discussed secure routing protocols, section 4 contains analysis of secure routing protocols with network layer attacks, and section 5 contains comparative analysis of secure routing layer protocols followed by conclusion and references.